How to solve LAN IP address conflicts and loop problems?
Jan 28, 2019

 Nowadays, people's lives are inseparable from the Internet. Enterprise office information is more dependent on the network. In order to improve the level of security management and informationization, many enterprises not only built a perfect office information system, but also deployed video surveillance . However, due to the lack of overall planning, or the consideration of the lack of weeks when selecting network products, the network construction did not achieve the expected results, followed by many application problems.   The following common problems in network applications, do you have a deep understanding of weak electrical engineers or network administrators?   1,     network cloning is slow   "Net gram (network cloning)" is the use of a server in a local area network to simultaneously transmit data to multiple clients through multicast or broadcast to achieve automatic installation, update or restore of the client system.   Sometimes, when a diskless system or system restore card installed in an Internet cafe or campus network uses the "Net" function on the switch , it may appear to be very slow. By modifying the storm control and flow control functions of the switch, such as shutting down the flow control on all ports, you can make the "net" work properly.   However, in general, to modify the switch configuration, you need to set the parameters in the management interface, you need to write code, the setup process is more complicated. Because the setting procedure of each switch is different, it will undoubtedly increase the workload and difficulty for network administrators.   2. The     switch loop causes the network to 瘫痪   In the network environment of schools, residential buildings, small and medium-sized enterprises, and hotels, as the scale of the network expands, a large number of switching devices need to be introduced. If you are not familiar with the network structure when building a network, it is easy to introduce loops into the network. The appearance of the loop can easily cause a broadcast packet to be continuously and cyclically forwarded in the network. The resulting broadcast storm will greatly consume network resources, resulting in the failure of normal data packets to be forwarded, and the network quality is seriously degraded or even paralyzed.   Reasons for the network loop: There is no reasonable planning for the network, so that multiple ports are connected to multiple devices to form a ring , and the line below a certain port is looped. The most prone to loops is new devices or network expansion . (For example, when your company has added a new department to build a network).   The performance of the network loop: the switch will be affected by a large amount of data information, causing serious blockage of the network transmission channel, and the data information cannot be transmitted in time. The most direct symptom is that the users in the same VLAN are connected to the Internet, and the network is disconnected when it occurs.   In the network, loops are easily caused by incorrect wiring. UTP3-GSW16/24 can detect loops in the network in a timely and effective manner without any configuration, automatically block ports and improve network reliability.   3,     small LAN routing leads to IP address conflicts   Many business users often encounter such a situation, the network is clearly good, suddenly can not go up or the network becomes slow. By checking the network configuration, it is found that the performance and port of the switch product are no problem. After inputting the IP address managed by the router, it is found that the management interface does not display the previous router, but other departments or other personnel have privately connected the router. Causes an IP address conflict.   This situation often occurs in environments with numerous departments, densely populated dormitories, or hotels. Take the hotel as an example. Customers often connect their own wireless router LAN port to the hotel network, causing IP address conflicts and network crashes.   In order to avoid this situation, you need to configure the DHCP snooping function for the switch and perform port isolation settings. However, the system settings also require professional network knowledge, need to understand the code, and increase the workload.   4, the     LAN is attacked by ARP virus   The ARP protocol is an abbreviation of the "Address Resolution Protocol". It is mainly used to implement the mutual conversion between the IP address and the physical address of the corresponding device, so as to achieve the purpose of accessing the network device through the IP address.   Due to some design flaws in the ARP protocol itself, the illegal intruder will illegally acquire and replace the MAC of another person by copying the correspondence between the IP and the MAC to achieve the purpose of illegally intercepting and acquiring data information. The way is called ARP virus intrusion.   ARP attacks are a common network phenomenon, and many friends use switches to prevent ARP attacks. For example, you can prevent malicious ARP spoofing by configuring the maximum number of MAC addresses on a port to limit and bind MAC addresses. However, this setting process is complicated.   5, the     office network is occupied by monitored data, resulting in slow network   With the increasing popularity of video surveillance systems, they are widely used in enterprise information construction. Many enterprises have not effectively separated the office network from the monitoring network at the beginning of the planning of the information system. As a result, the video surveillance data occupies a large bandwidth, resulting in a slower network speed of the enterprise, which affects the normal business development of the enterprise.   Generally, network administrators can isolate ports through VLANs or use independent switches to isolate office networks and monitoring networks. In the case of a limited budget, some also set up different network segments to achieve network isolation.   Of course, different users have different network application problems in different application scenarios. However, if network planning can be done in advance, or equipment selection and configuration can be done, network failure can be greatly reduced. Switch selection and configuration are critical in preventing network security and ensuring network application stability.   However, the setting of network equipment is quite cumbersome. Even professional technicians will inevitably encounter some difficulties. Is there a switch that can provide different network security solutions for different application scenarios and network environments without the need for cumbersome settings, just switch to the desired application mode according to the application scenario? 

  • facebook